Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-35335 | SRG-APP-000190-AS-000134 | SV-46622r1_rule | Low |
Description |
---|
If communications sessions remain open for extended periods of time even when unused, there is the potential for an adversary to hijack the session and use it to gain access to the device or networks to which it is attached. Terminating sessions after a certain period of inactivity is a method for mitigating the risk of this vulnerability. The application server must provide a mechanism for timing out or otherwise terminating inactive web sessions. |
STIG | Date |
---|---|
Application Server Security Requirements Guide | 2013-01-08 |
Check Text ( C-43703r1_chk ) |
---|
Review the AS configuration to verify the system terminates network connections after an organization defined time period of inactivity. If communications are not terminated after an organization-defined time period of inactivity, this is a finding. |
Fix Text (F-39881r1_fix) |
---|
Configure the AS to terminate network connections after the organization defined time period of inactivity. |